A Secure Deployment Checklist

The following security checklist lists guidelines to help you secure Oracle Application Integration Architecture (Oracle AIA) and its components.

  • Configure and deploy only the pre-built integration options you need.

  • Enforce strong password management.

  • Restrict and control user privileges.

  • Restrict network access by doing the following:

    • Use firewalls.

    • Never leave an unnecessary opening in a firewall.

    • Monitor who accesses your systems.

    • Because network traffic is not encrypted, you must physically secure the JDBC network connection between the application server to the database by using a subnet dedicated to this communication and ensure that the network is not accessible to ordinary users.

    • Install the operating system in a secure location that is difficult for a hacker to access.

  • Apply all security patches and workarounds.

  • Encrypt sensitive information.

  • Contact Oracle support if you discover a vulnerability in any Oracle product.